{"id":3083,"date":"2021-09-14T19:12:32","date_gmt":"2021-09-14T17:12:32","guid":{"rendered":"https:\/\/prahaskolska-backup.200.solutions.uvirt120.active24.cz\/?p=3083"},"modified":"2021-09-14T19:12:32","modified_gmt":"2021-09-14T17:12:32","slug":"malware-ktery-se-stal-v-uplynulem-mesici-jeden-z-nejrozsirenejsich-na-svete","status":"publish","type":"post","link":"https:\/\/prahaskolska-backup.200.solutions\/?p=3083","title":{"rendered":"Malware, kter\u00fd se stal v uplynul\u00e9m m\u011bs\u00edci jeden z nejroz\u0161\u00ed\u0159en\u011bj\u0161\u00edch na sv\u011bt\u011b"},"content":{"rendered":"\n<p><strong>Malware ur\u010den\u00fd ke kr\u00e1de\u017e\u00edm p\u0159ihla\u0161ovac\u00edch \u00fadaj\u016f se roz\u0161\u00ed\u0159il teprve ned\u00e1vno. P\u0159esto je v\u0161ak v&nbsp;uplynul\u00e9m m\u011bs\u00edci v&nbsp;r\u00e1mci \u010ceska pova\u017eov\u00e1n za hrozbu \u010d\u00edslo jedna, ve sv\u011bt\u011b se pohybuje na druh\u00e9m m\u00edst\u011b. Nejste i vy ob\u011b\u0165 tohoto malwaru?<\/strong><\/p>\n\n\n\n<p>Snake Keylogger, jak se dan\u00e9mu malwaru p\u0159ezd\u00edv\u00e1, je podle statistik kyberbezpe\u010dnost\u00ed spole\u010dnosti Check Point nyn\u00ed druhou nejroz\u0161\u00ed\u0159en\u011bj\u0161\u00ed hrozbou na sv\u011bt\u011b po trojsk\u00e9m koni Trickbotovi, kter\u00fd je trnem v&nbsp;oku v\u0161em ji\u017e del\u0161\u00ed dobu. Mezi funkce Snake Keyloggeru pat\u0159\u00ed zaznamen\u00e1v\u00e1n\u00ed stisknut\u00fdch kl\u00e1ves, d\u00edky \u010demu\u017e je schopn\u00fd ukr\u00e1st p\u0159ihla\u0161ovac\u00ed \u00fadaje, kter\u00e9 n\u00e1sledn\u011b odes\u00edl\u00e1 \u00fato\u010dn\u00edk\u016fm.<\/p>\n\n\n\n<p>Nej\u010dast\u011bj\u0161\u00ed zp\u016fsob \u0161\u00ed\u0159en\u00ed viru je pomoc\u00ed phishingov\u00fdch e-mail\u016f. Ty zpravidla funguj\u00ed tak, \u017ee se hromadn\u011b po\u0161lou e-maily n\u00e1hodn\u00fdm lidem, kter\u00e9 se sna\u017e\u00ed vypadat d\u016fv\u011b\u0159iv\u011b jako nap\u0159\u00edklad soci\u00e1ln\u00ed s\u00ed\u0165, \u00fa\u0159ad st\u00e1tn\u00ed spr\u00e1vy, IT administr\u00e1to\u0159i aj. Ne\u0161varem tedy je, \u017ee si u\u017eivatel neuv\u011bdomuje \u0161kodlivost a v\u011b\u0159\u00ed p\u0159ilo\u017een\u00e9 p\u0159\u00edloze a pust\u00ed je v&nbsp;podstat\u011b do po\u010d\u00edta\u010de s\u00e1m. V\u011bt\u0161ina takov\u00fdch e-mail\u016f obsahuje n\u011bjak\u00e9 p\u0159eklepy v&nbsp;odkazech \u010di e-mailov\u00fdch adres\u00e1ch.<\/p>\n\n\n\n<p>Zabr\u00e1nit takov\u00fdm malwar\u016fm m\u016f\u017ee u\u017eivatel pomoc\u00ed dostate\u010dn\u00e9 ochrany. To znamen\u00e1 neklikat na \u017e\u00e1dn\u00e9 podez\u0159el\u00e9 e-maily a u\u017e v\u016fbec ne na odkazy \u010di p\u0159\u00edlohy. Nutnost\u00ed by m\u011blo b\u00fdt dostate\u010dn\u011b siln\u00e9 heslo a je-li to mo\u017en\u00e9, nejl\u00e9pe dvouf\u00e1zov\u00e9 ov\u011b\u0159en\u00ed. Tak\u00e9 nen\u00ed dobr\u00e9 pou\u017e\u00edvat stejn\u00e1 hesla na r\u016fzn\u00fdch str\u00e1nk\u00e1ch, \u010d\u00edm\u017e se minimalizuje riziko, a i kdy\u017e \u00fato\u010dn\u00edk z\u00edsk\u00e1 heslo na jedn\u00e9 str\u00e1nce, na jin\u00e9 ji\u017e nepochod\u00ed. &nbsp;<\/p>\n\n\n\n<p><em>Fotografie od u\u017eivatele <a href=\"https:\/\/www.pexels.com\/@sora-shimazaki\">Sora Shimazaki<\/a><\/em> <em>ze slu\u017eby <a href=\"https:\/\/www.pexels.com\/photo\/crop-cyber-spy-hacking-system-while-typing-on-laptop-5935794\/\">Pexels<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware ur\u010den\u00fd ke kr\u00e1de\u017e\u00edm p\u0159ihla\u0161ovac\u00edch \u00fadaj\u016f se roz\u0161\u00ed\u0159il teprve ned\u00e1vno. P\u0159esto je v\u0161ak v&nbsp;uplynul\u00e9m m\u011bs\u00edci v&nbsp;r\u00e1mci \u010ceska pova\u017eov\u00e1n za hrozbu \u010d\u00edslo jedna, ve sv\u011bt\u011b se pohybuje na druh\u00e9m m\u00edst\u011b. Nejste [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":3084,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[46,48],"tags":[8],"class_list":["post-3083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-studentske-zpravodajstvi","category-technologie","tag-rodic-zak"],"acf":[],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=\/wp\/v2\/posts\/3083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3083"}],"version-history":[{"count":1,"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=\/wp\/v2\/posts\/3083\/revisions"}],"predecessor-version":[{"id":3085,"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=\/wp\/v2\/posts\/3083\/revisions\/3085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=\/wp\/v2\/media\/3084"}],"wp:attachment":[{"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prahaskolska-backup.200.solutions\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}